Bitvisor: a thin hypervisor for enforcing i/o device security T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ... Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009 | 344 | 2009 |
{GPUvm}: Why Not Virtualizing {GPUs} at the Hypervisor? Y Suzuki, S Kato, H Yamada, K Kono 2014 USENIX Annual Technical Conference (USENIX ATC 14), 109-120, 2014 | 284* | 2014 |
Sania: Syntactic and semantic analysis for automated testing against sql injection Y Kosuga, K Kono, M Hanaoka, M Hishiyama, Y Takahama Twenty-third annual computer security applications conference (ACSAC 2007 …, 2007 | 165 | 2007 |
Honeyguide: A vm migration-aware network topology for saving energy consumption in data center networks H Shirayanagi, H Yamada, K Kono IEICE TRANSACTIONS on Information and Systems 96 (9), 2055-2064, 2013 | 78 | 2013 |
Towards unobtrusive vm live migration for cloud computing platforms A Koto, H Yamada, K Ohmura, K Kono Proceedings of the Asia-Pacific Workshop on Systems, 1-6, 2012 | 74 | 2012 |
Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery K Yamakita, H Yamada, K Kono 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 59 | 2011 |
Efficient kernel support of fine-grained protection domains for mobile code M Takahashi, K Kono, T Masuda Proceedings. 19th IEEE International Conference on Distributed Computing …, 1999 | 52 | 1999 |
Aspfuzz: A state-aware protocol fuzzer based on application-layer protocols T Kitagawa, M Hanaoka, K Kono The IEEE symposium on Computers and Communications, 202-208, 2010 | 43 | 2010 |
Efficient RMI: Dynamic specialization of object serialization K Kono, T Masuda Proceedings 20th IEEE International Conference on Distributed Computing …, 2000 | 40 | 2000 |
Gpuvm: Gpu virtualization at the hypervisor Y Suzuki, S Kato, H Yamada, K Kono IEEE Transactions on Computers 65 (9), 2752-2766, 2015 | 39 | 2015 |
Smart remote procedure calls: Transparent treatment of remote pointers K Kono, K Kato, T Masuda 14th International Conference on Distributed Computing Systems, 142-151, 1994 | 33 | 1994 |
Is linux kernel oops useful or not? T Yoshimura, H Yamada, K Kono Eighth Workshop on Hot Topics in System Dependability (HotDep 12), 2012 | 29 | 2012 |
An integrated laboratory for processor organization, compiler design, and computer networking K Abe, T Tateoka, M Suzuki, Y Maeda, K Kono, T Watanabe IEEE Transactions on Education 47 (3), 311-320, 2004 | 27 | 2004 |
拡張コンポーネントのためのカーネルによる細粒度軽量保護ドメインの実現 品川高廣, 河野健二, 高橋雅彦, 益田隆司 情報処理学会論文誌 40 (6), 2596-2606, 1999 | 25 | 1999 |
Traveling forward in time to newer operating systems using shadowreboot H Yamada, K Kono Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013 | 24 | 2013 |
Protected and secure mobile object computing in Planet K Kato 2nd ECOOP Workshop on Mobile Object Systems, 319-326, 1996 | 20 | 1996 |
Using attack information to reduce false positives in network ids M Shimamura, K Kono 11th IEEE Symposium on Computers and Communications (ISCC'06), 386-393, 2006 | 19 | 2006 |
Automated detection of session management vulnerabilities in web applications Y Takamatsu, Y Kosuga, K Kono 2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012 | 18 | 2012 |
Tuning mechanisms for two major parameters of Apache web servers A Sugiki, K Kono, H Iwasaki Software: Practice and Experience 38 (12), 1215-1240, 2008 | 18 | 2008 |
Do injected faults cause real failures? A case study of Linux N Kikuchi, T Yoshimura, R Sakuma, K Kono 2014 IEEE International Symposium on Software Reliability Engineering …, 2014 | 17 | 2014 |